Refer to the exhibit which shows an nslookup output of MX records of the example.com domain.
Which two MTA selection behaviors for the example.com domain are correct? (Choose two.)
Which two FortiMail antispam techniques can you use to combat zero-day spam? (Choose two.)
Refer to the exhibit which displays a history log entry.
Why does the last field show SYSTEM in the Policy ID column?
Refer to the exhibit, which shows an inbound recipient policy.
After creating the policy shown in the exhibit, an administrator discovers that clients can send unauthenticated emails using SMTP.
What must the administrator do to enforce authentication?
Which statement about how impersonation analysis identifies spoofed email addresses is correct?
In which two places can the maximum email size be overridden on FortiMail? (Choose two.)